100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 12: IT Technical Support and Management - Assignment 2 - (Learning Aims B) (All Criterias Met)

Rating
4.4
(5)
Sold
14
Pages
27
Grade
A+
Uploaded on
12-02-2023
Written in
2021/2022

This essay is a distinction-level work for Unit 12: Mobile Apps Development - Assignment 1 - Learning Aim b. You can efficiently work on your assignment by following my layout. in order to achieve the best grade (Distinction). All of the following criteria is met in this document: P3 - Complete at least six routine IT support activities safely, using some appropriate processes and behaviours. P4 - Monitor the performance of the IT system safely against the client’s requirements, using some appropriate processes and behaviours. M2 - Complete at least six routine IT support activities safely and monitor the system’s performance to meet the client’s requirements, using appropriate processes and behaviours. D2 - Complete at least six routine IT support activities safely and optimise the system’s performance to meet the client’s requirements, behaviours effectively. Any problems feel free to message me and i will get back to you as soon as possible

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
February 12, 2023
Number of pages
27
Written in
2021/2022
Type
Essay
Professor(s)
Unknown
Grade
A+

Subjects

Content preview

Unit 12 – Technical Support and Management



Contents
Introduction:......................................................................................................................................2
Client requirements:..........................................................................................................................2
P3. Complete at least six routine IT support activities safely, using some appropriate processes and
behaviours:........................................................................................................................................2
Antivirus:............................................................................................................................................3
Firewall:.............................................................................................................................................3
System Update:.................................................................................................................................4
Scan Disk:...........................................................................................................................................4
Defrag:...............................................................................................................................................4
Backup:..............................................................................................................................................4
P4. Monitor the performance of the IT system safely against the client’s requirements, using some
appropriate processes and behaviours..............................................................................................5
Antivirus:............................................................................................................................................5
Before:...............................................................................................................................................5
After:..................................................................................................................................................6
Firewall:.............................................................................................................................................6
Before:...............................................................................................................................................6
After:..................................................................................................................................................7
System Update:.................................................................................................................................7
After:..................................................................................................................................................7
Before:...............................................................................................................................................8
After:..................................................................................................................................................8
Defrag:...............................................................................................................................................9
Before:...............................................................................................................................................9
Backup:............................................................................................................................................10
Before:.............................................................................................................................................10
After:................................................................................................................................................11
M2. Complete at least six routine IT support activities safely and monitor the system’s
performance to meet the client’s requirements, using appropriate processes and behaviours:....11
Antivirus:..........................................................................................................................................11
Firewall:...........................................................................................................................................12
System Update:................................................................................................................................12
Scan Disk:.........................................................................................................................................12
Defrag:.............................................................................................................................................13

, Unit 12 – Technical Support and Management


Backup:............................................................................................................................................14
D2. Complete at least six routine IT support activities safely and optimise the system’s
performance to meet the client’s requirements, using processes and behaviours effectively:.......15
Antivirus:..........................................................................................................................................15
Firewall:...........................................................................................................................................17
System Update:................................................................................................................................20
Scan disc:.........................................................................................................................................22
Defrag:.............................................................................................................................................24
Backup:............................................................................................................................................26




Unit 12 – Technical Support and Management (Part B)
Introduction:
I have been working for a PC repair company as an IT Technician. I will be carrying out 6 IT
support and management tasks, I will be monitoring the system to see how they perform,
how are the optimised and how they meet the client requirements so secure the system
with an excellent performance. I will be providing the details on a report including the
evidence to show how the optimisations are intended for the improvement of the
performance.

Client requirements:
The 7 IT support and management tasks I will be carrying out has be effectively related to
the:
 User issue and fault logging
 Communication with users to resolve technical issues
 Support and repair tasks including work around solutions
 User account management
 Hardware or software installation or upgrade
 Individual device configuration
 Storage management
 Peripheral installation and/or configuration
 Software management
 Disk configuration


P3. Complete at least six routine IT support activities safely, using
some appropriate processes and behaviours:
The 7 IT support activities I will be I will be completing safely, using the appropriate
processes and behaviours are:
 Antivirus
 Firewall
 System Update

, Unit 12 – Technical Support and Management


 Scan Disk
 Defrag
 Backup

Antivirus:
Antivirus software is meant to identify, block, and respond to dangerous software, such as
viruses, on a computer, within an IT system. Antivirus software is a vital aspect of a
comprehensive security approach, even if you operate your computer carefully to prevent
coming into touch with a virus. Antivirus software operates in the background, checking
every file opened in a computer and comparing it to known viruses and other forms of
malware in order to assist the users avoid infecting their computer. The programme also
performs system scans to guarantee that the computers are free of viruses. If the antivirus
software detects a virus or other malware signature, it will block the file from executing and
place it in quarantine, where it will either be deleted automatically, or the user may opt to
execute it if they are convinced it, is a false detection. Any company that wants to keep its
data and computer systems from getting corrupted needs antivirus protection. Antivirus
software acts as a security guard at the entrance, stopping intruders from entering. Because
prevention is much more effective than cure, having a system in place to identify and
prevent viral assaults is preferable than having to spend time and money patching affected
equipment.
Furthermore, if a virus exposes sensitive customer data or sends unwanted emails to
the contacts in an effort to spread the infection further, the organisation image might be
jeopardised.

Firewall:
A firewall is a computer hardware or software security device that may help safeguard
the network within an IT system by filtering traffic and preventing unwanted access to
confidential data on organisations computers. A firewall not only blocks unwanted traffic,
but it may also assist prevent harmful malware from infiltrating the computers. Different
degrees of protection may be provided by firewalls. The challenge is to determine how
much protection the organisation will need. A firewall serves as a kind of gatekeeper. It
monitors efforts to obtain access to the operating system of the organisation and prevents
undesired traffic or unidentified sources. A firewall is a device that functions as a barrier or
filter between computers and external networks, such as the internet. Consider a firewall to
be a traffic controller. It helps to safeguard the organisation's network and information
inside the system by regulating network traffic. This involves restricting unsolicited incoming
network traffic and authenticating access by scanning network traffic for harmful elements
such as hackers and viruses.
A firewall is normally pre-installed with the operating system and security software. It's a
good idea to have such functionalities enabled. Checking security settings to ensure they are
set to execute updates automatically is a necessity.
$11.69
Get access to the full document:
Purchased by 14 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Reviews from verified buyers

Showing all 5 reviews
6 months ago

1 year ago

1 year ago

2 year ago

2 year ago

2 year ago

thanks for your feedback, is there somehow I can help you to improve your assignment if any parts are not meeting your requirements? I have direct messaged you.

4.4

5 reviews

5
3
4
1
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Afsar08 Middlesex University
Follow You need to be logged in order to follow users or courses
Sold
291
Member since
3 year
Number of followers
203
Documents
29
Last sold
1 week ago

4.3

67 reviews

5
43
4
14
3
4
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions